Patrick Bas
Patrick Bas
CNRS CRIStAL
Verified email at centralelille.fr - Homepage
Title
Cited by
Cited by
Year
Steganalysis by subtractive pixel adjacency matrix
T Pevny, P Bas, J Fridrich
IEEE Transactions on information Forensics and Security 5 (2), 215-224, 2010
10622010
” Break our steganographic system”: the ins and outs of organizing BOSS
P Bas, T Filler, T Pevný
International workshop on information hiding, 59-70, 2011
8172011
OP-ELM: optimally pruned extreme learning machine
Y Miche, A Sorjamaa, P Bas, O Simula, C Jutten, A Lendasse
IEEE transactions on neural networks 21 (1), 158-162, 2009
7912009
Using high-dimensional image models to perform highly undetectable steganography
T Pevný, T Filler, P Bas
International Workshop on Information Hiding, 161-177, 2010
7412010
Geometrically invariant watermarking using feature points
P Bas, JM Chassery, B Macq
IEEE transactions on image Processing 11 (9), 1014-1028, 2002
7332002
Moving steganography and steganalysis from the laboratory into the real world
AD Ker, P Bas, R Böhme, R Cogranne, S Craver, T Filler, J Fridrich, ...
Proceedings of the first ACM workshop on Information hiding and multimedia …, 2013
2572013
TROP-ELM: a double-regularized ELM using LARS and Tikhonov regularization
Y Miche, M Van Heeswijk, P Bas, O Simula, A Lendasse
Neurocomputing 74 (16), 2413-2421, 2011
2282011
Color image watermarking using quaternion Fourier transform
P Bas, N Le Bihan, JM Chassery
2003 IEEE International Conference on Acoustics, Speech, and Signal …, 2003
1682003
Kerckhoffs-based embedding security classes for woa data hiding
F Cayre, P Bas
IEEE Transactions on Information Forensics and Security 3 (1), 1-15, 2008
972008
Using the fractal code to watermark images
P Bas, JM Chassery, F Davoine
Proceedings 1998 International Conference on Image Processing. ICIP98 (Cat …, 1998
881998
BOWS-2
P Bas, T Furon
872007
Robust watermarking based on the warping of predefined triangular patterns
P Bas, JM Chassery, BMM Macq
Security and Watermarking of Multimedia Contents II 3971, 99-109, 2000
862000
A Methodology for Building Regression Models using Extreme Learning Machine: OP-ELM.
Y Miche, P Bas, C Jutten, O Simula, A Lendasse
ESANN, 247-252, 2008
762008
Broken arrows
T Furon, P Bas
EURASIP Journal on Information Security 2008, 1-13, 2008
702008
Image watermarking: an evolution to content based approaches
P Bas, JM Chassery, B Macq
Pattern recognition 35 (3), 545-561, 2002
682002
BOSS (break our steganography system)
T Filler, T Pevný, P Bas
552010
Méthodes de tatouage d'images fondées sur le contenu
P Bas
Éditeur inconnu, 2000
532000
A new video-object watermarking scheme robust to object manipulation
P Bas, B Macq
Proceedings 2001 International Conference on Image Processing (Cat. No …, 2001
512001
A feature selection methodology for steganalysis
Y Miche, B Roue, A Lendasse, P Bas
International Workshop on Multimedia Content Representation, Classification …, 2006
492006
The ALASKA steganalysis challenge: A first step towards steganalysis
R Cogranne, Q Giboulot, P Bas
Proceedings of the ACM Workshop on Information Hiding and Multimedia …, 2019
452019
The system can't perform the operation now. Try again later.
Articles 1–20